首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1923篇
  免费   141篇
  国内免费   57篇
化学   345篇
晶体学   4篇
力学   213篇
综合类   45篇
数学   752篇
物理学   762篇
  2024年   2篇
  2023年   29篇
  2022年   72篇
  2021年   49篇
  2020年   47篇
  2019年   39篇
  2018年   36篇
  2017年   51篇
  2016年   58篇
  2015年   62篇
  2014年   128篇
  2013年   143篇
  2012年   89篇
  2011年   113篇
  2010年   108篇
  2009年   129篇
  2008年   126篇
  2007年   117篇
  2006年   80篇
  2005年   73篇
  2004年   55篇
  2003年   58篇
  2002年   55篇
  2001年   46篇
  2000年   35篇
  1999年   44篇
  1998年   36篇
  1997年   34篇
  1996年   29篇
  1995年   28篇
  1994年   32篇
  1993年   22篇
  1992年   15篇
  1991年   15篇
  1990年   4篇
  1989年   5篇
  1988年   10篇
  1987年   8篇
  1986年   6篇
  1985年   1篇
  1984年   5篇
  1983年   2篇
  1982年   2篇
  1980年   3篇
  1979年   3篇
  1978年   3篇
  1977年   3篇
  1976年   6篇
  1975年   2篇
  1974年   3篇
排序方式: 共有2121条查询结果,搜索用时 15 毫秒
91.
介绍了JCOGIN支撑软件框架层次式、模块化的体系结构及其核心数据结构。这些使得JCOGIN软件框架能够支撑大规模复杂几何的蒙特卡罗(MC)粒子输运并行计算。同时介绍了在JCOGIN支撑软件框架下研发的JMCT程序,并进行了性能测试,在2万处理器核上模拟20亿粒子,并行效率达到70%。  相似文献   
92.
An enterprise’s private cloud may be attacked by attackers when communicating with the public cloud. Although traffic detection methods based on deep learning have been widely used, these methods rely on a large amount of sample data and cannot quickly detect new attacks such as Zero-day Attacks. Moreover, deep learning has a black-box nature and cannot interpret the detection results, which has certain security risks. This paper proposes an interpretable abnormal traffic detection method, which can complete the detection task with only a few malicious traffic samples. Specifically, it uses the covariance matrix to characterize each traffic category and then calculates the similarity between the query traffic and each category according to the covariance metric function to realize the traffic detection based on few-shot learning. After that, the traffic images processed by the random masks are input into the model to obtain the predicted probability of the corresponding traffic category. Finally, the predicted probability is linearly summed with each mask to generate the final saliency map to interpret and analyze the model decision. In this paper, experiments are carried out by simulating only 15 and 25 malicious traffic samples. The results show that the proposed method can obtain good accuracy and recall, and the interpretation analysis shows that the model is reliable and interpretable.  相似文献   
93.
This paper analyzes the solution of simultaneous equations models. Efficient algorithms for the two-stage least squares method using QR-decomposition are developed and studied. The reduction of the execution time when the structure of the matrices in each equation is exploited is analyzed theoretically and experimentally. An efficient algorithm for the indirect least squares method is developed. Some techniques are used to accelerate the solution of the problem: parallel versions for multicore systems, and extensive use of the MKL library, thus obtaining efficient, portable versions of the algorithms.  相似文献   
94.
We study the time evolution of entanglement of two spins in an anisotropically coupled quantum dot interacting with the unpolarised nuclear spins environment. We assume that the exchange coupling strength in the z direction J z is different from the lateral one J l . We observe that the entanglement decays as a result of the coupling to the nuclear environment and reaches a saturation value, which depends on the value of the exchange interaction difference J = ‖J l ? J z ‖ between the two spins and the strength of the applied external magnetic field. We find that the entanglement exhibits a critical behaviour controlled by the competition between the exchange interaction J and the external magnetic field. The entanglement shows a quasi-symmetric behaviour above and below a critical value of the exchange interaction. It becomes more symmetric as the external magnetic field increases. The entanglement reaches a large saturation value, close to unity, when the exchange interaction is far above or below its critical value and a small one as it closely approaches the critical value. Furthermore, we find that the decay rate profile of entanglement is linear when the exchange interaction is much higher or lower than the critical value but converts to a power law and finally to a Gaussian as the critical value is approached from both directions. The dynamics of entanglement is found to be independent of the exchange interaction for an isotropically coupled quantum dot.  相似文献   
95.
《Physics letters. A》2020,384(27):126686
It has recently been argued in Aharonov et al. (2016) that quantum mechanics violates the Pigeon Counting Principle (PCP) which states that if one distributes three pigeons among two boxes there must be at least two pigeons in one of the boxes. However, this conclusion cannot be justified by rigorous theoretical arguments. The issue is further complicated by experimental confirmation of the transition amplitudes predicted in this paper that nevertheless do not support the conclusion of PCP violation. Here we prove via a set of operator identities that the PCP is not violated within quantum mechanics, regardless of interpretation.  相似文献   
96.
This paper presents a parallel tabu search algorithm that utilizes several different neighborhood structures for solving the capacitated vehicle routing problem. Single neighborhood or neighborhood combinations are encapsulated in tabu search threads and they cooperate through a solution pool for the purpose of exploiting their joint power. The computational experiments on 32 large scale benchmark instances show that the proposed method is highly effective and competitive, providing new best solutions to four instances while the average deviation of all best solutions found from the collective best results reported in the literature is about 0.22%. We are also able to associate the beneficial use of special neighborhoods with some test instance characteristics and uncover some sources of the collective power of multi-neighborhood cooperation.  相似文献   
97.
提出一种新的区域分解波形松弛算法, 使得可以在不同的子域采用不同的时间步长来并行求解线性抛物方程的初边值问题. 与传统的区域分解波形松弛算法相比, 该算法可以通过预条件子来加快收敛速度, 并且对内存的需求大大降低. 给出了局部时间步长一种具体的实现方法, 证明了离散解的存在唯一性, 并在时间连续水平分析了预条件系统. 数值实验显示了新算法的有效性.  相似文献   
98.
On this paper, we investigate the algorithm and efficiency of simulation of optical devices using parallel computing method, implement some real wavelength division multiplexing (WDM) components such as resonators to test the method's possibility and efficiency.  相似文献   
99.
邓薇  严培胜  高成修 《数学杂志》2006,26(5):545-550
本文提出了带时间窗和车辆数目限制的车辆路线问题的数学模型,针对该问题的特征构造了一种路线生成算法和禁忌搜索算法,并对Solomon提出的C1、R1、RC1类数据集给出了数值运算的结果,实验结果表明算法是有效的.  相似文献   
100.
In multi-echo imaging sequences like fast spin echo (FSE), the point spread function (PSF) in the phase encoding direction contains significant secondary peaks (sidebands). This is due to discontinuities in adjacent k-space data obtained at different echo times caused by T2 decay, and leads to ghosting and hence reduced image quality. Recently, utilising multiple coils for signal reception has become the standard configuration for MR systems due to the additional flexibility that parallel imaging (PI) methods can provide. PI methods generally obtain more data than is required to reconstruct an image. Here, this redundancy in information is exploited to reduce discontinuity-related ghosting in FSE imaging. Adjacent phase encoded k-space lines are acquired at different echo times alternately in the regions of discontinuity (called ‘feathering’). This moves the resulting ghost artefacts to the edges of the field of view. This property of the ghost then makes them amenable to removal using PI methods. With ‘feathered’ array coil data it is possible to reconstruct data over the region of the discontinuity from both echo times. By combining this data, a significant reduction in ghosting can be achieved. We show this approach to be effective through simulated and acquired MRI data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号